Количество 5
Количество 5
CVE-2025-61912
python-ldap is a lightweight directory access protocol (LDAP) client API for Python. In versions prior to 3.4.5, ldap.dn.escape_dn_chars() escapes \x00 incorrectly by emitting a backslash followed by a literal NUL byte instead of the RFC-4514 hex form \00. Any application that uses this helper to construct DNs from untrusted input can be made to consistently fail before a request is sent to the LDAP server (e.g., AD), resulting in a client-side denial of service. Version 3.4.5 contains a patch for the issue.
CVE-2025-61912
python-ldap is a lightweight directory access protocol (LDAP) client API for Python. In versions prior to 3.4.5, ldap.dn.escape_dn_chars() escapes \x00 incorrectly by emitting a backslash followed by a literal NUL byte instead of the RFC-4514 hex form \00. Any application that uses this helper to construct DNs from untrusted input can be made to consistently fail before a request is sent to the LDAP server (e.g., AD), resulting in a client-side denial of service. Version 3.4.5 contains a patch for the issue.
CVE-2025-61912
python-ldap is a lightweight directory access protocol (LDAP) client A ...
ROS-20260129-73-0020
Уязвимость python-ldap
GHSA-p34h-wq7j-h5v6
python-ldap is Vulnerable to Improper Encoding or Escaping of Output and Improper Null Termination
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-61912 python-ldap is a lightweight directory access protocol (LDAP) client API for Python. In versions prior to 3.4.5, ldap.dn.escape_dn_chars() escapes \x00 incorrectly by emitting a backslash followed by a literal NUL byte instead of the RFC-4514 hex form \00. Any application that uses this helper to construct DNs from untrusted input can be made to consistently fail before a request is sent to the LDAP server (e.g., AD), resulting in a client-side denial of service. Version 3.4.5 contains a patch for the issue. | CVSS3: 5.3 | 0% Низкий | 4 месяца назад | |
CVE-2025-61912 python-ldap is a lightweight directory access protocol (LDAP) client API for Python. In versions prior to 3.4.5, ldap.dn.escape_dn_chars() escapes \x00 incorrectly by emitting a backslash followed by a literal NUL byte instead of the RFC-4514 hex form \00. Any application that uses this helper to construct DNs from untrusted input can be made to consistently fail before a request is sent to the LDAP server (e.g., AD), resulting in a client-side denial of service. Version 3.4.5 contains a patch for the issue. | CVSS3: 5.3 | 0% Низкий | 4 месяца назад | |
CVE-2025-61912 python-ldap is a lightweight directory access protocol (LDAP) client A ... | CVSS3: 5.3 | 0% Низкий | 4 месяца назад | |
ROS-20260129-73-0020 Уязвимость python-ldap | CVSS3: 5.3 | 0% Низкий | 11 дней назад | |
GHSA-p34h-wq7j-h5v6 python-ldap is Vulnerable to Improper Encoding or Escaping of Output and Improper Null Termination | 0% Низкий | 4 месяца назад |
Уязвимостей на страницу